Problem solve
Get help with specific problems with your technologies, process and projects.
Managed network security services
Designing a WAN infrastructure
The wide area network is the single biggest contributor to a corporate network's cost of ownership. Therefore, this is the area where the cost-versus-performance tradeoff is most pronounced and most critical. This tip explores the various ... Continue Reading
The role of firewalls and VPNs in email security
A guide to understanding how VPNs and firewalls combine to increase email security, tailored to issues facing consultants and systems integrators working to secure their customers' email systems. Continue Reading
Add DKIM to your customer's email security solution
This concise comparison between DKIMs, S/MIME and OpenPGP will help value-added resellers (VARs) and consultants implement a secure email solution for their customers. Continue Reading
-
Securing your customer's email with digital signatures
Security consultants and systems integrators will learn the dos and don'ts of implementing digital signatures to improve their customers' email security with this tip. Continue Reading
Protect your customer's business from phishing attacks
Phishing attacks can do more than lower end-user productivity; they can actually put your customer's reputation at risk. This tip provides value-added resellers (VARs) and consultants strategies for protecting customers against phishing attacks. Continue Reading
Email encryption mechanisms
Value-added resellers (VARs) and security consultants can use this tip to get advice on how to add security to email communications through encryption.Continue Reading
Detect and filter spam: Three complementary antispam techniques
By following the "cocktail" approach discussed in this tip, value-added resellers (VARs) and security consultants can efficiently reduce spam on their customers' networks.Continue Reading
Transport Layer Security encryption: Five steps to get you started
Value-added resellers (VARs) and consultants can provide customers with email security and privacy assurance using the Transport Layer Security encryption and authentication protocol. This tip, reposted courtesy of SearchSecurity.com, explains how ...Continue Reading
Microsoft vs. third-party security tools
This tip compares Microsoft's firewall and antispyware tools with those of third-party competitors, to help security consultants and value-added resellers (VARs) make informed product decisions.Continue Reading
Windows client security strategies
A set of important Windows client security settings and hardening strategies for value-added resellers and security consultants.Continue Reading
-
Windows network security: Tools for finding internal weaknesses
Your customer's end users can cause as much -- if not more -- damage as malicious intruders coming in from the outside of the network. This tip identifies four tests and the tools you can use to conduct them, for identifying internal weaknesses that...Continue Reading
Windows networking: Five security mistakes to avoid
Are you making a common mistake when it comes to your customer's Windows network security? This tip helps you avoid the most prevalent errors.Continue Reading
Firewall architectures for SMB networks
This tip offers best practices for setting up and administering a network firewall and IDS for an SMB, keeping in mind tight budgets and smaller staffs.Continue Reading
Testing patches virtually saves money and space
Your customer's tight IT budget or a lack of physical space may make it difficult to dedicate a standalone Windows machine to patch testing. Here's an alternative testing method.Continue Reading
How to build a firewall architecture
Designing and implementing a customer's network firewall solution can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. In this series of tips, we take a detailed look at the ...Continue Reading